In reviewing service desk requests, management has requested that the security analyst investigate the requests submitted by the new human resources manager. The requests consist of “unlocking” files that belonged to the previous human manager. The security analyst has uncovered a tool that is used to display five-level passwords. This tool is being used by several members of the service desk to unlock files. The content of these particular files is highly sensitive information pertaining to personnel.
Which of the following BEST describes this scenario? (Choose two.)
A . Unauthorized data exfiltration
B . Unauthorized data masking
C . Unauthorized access
D . Unauthorized software
E . Unauthorized controls
Answer: C